Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
Payment confirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment confirmation.exe
Resource
win10v2004-20220414-en
General
-
Target
Payment confirmation.exe
-
Size
316KB
-
MD5
09e1f9b49bb6d33d6b88518c9449fde1
-
SHA1
accd9fdf8c6166e8e887e3bfc92c4cf3cb91ca46
-
SHA256
432feb3811e7e4993eedfdea5735d5790ec0dd0a660a4940841969ffee54194c
-
SHA512
d13a7366975ad9ff8a61eaac76d7bf3318b3966341af91b8a7c75d31909ae98e1a8c9e83553f3ffa43a5c54eae220941c9f1dc64607ea5c5320906d5510789e1
Malware Config
Extracted
Protocol: smtp- Host:
mail.aviner.co.za - Port:
587 - Username:
[email protected] - Password:
NoLimits@
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
InstallUtil.exepid Process 4208 InstallUtil.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment confirmation.exedescription pid Process procid_target PID 4276 set thread context of 4208 4276 Payment confirmation.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Payment confirmation.exeInstallUtil.exepid Process 4276 Payment confirmation.exe 4276 Payment confirmation.exe 4276 Payment confirmation.exe 4208 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment confirmation.exeInstallUtil.exedescription pid Process Token: SeDebugPrivilege 4276 Payment confirmation.exe Token: SeDebugPrivilege 4208 InstallUtil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Payment confirmation.exedescription pid Process procid_target PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 PID 4276 wrote to memory of 4208 4276 Payment confirmation.exe 89 -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4208
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159